SigmaHQ / sigma

Main Sigma Rule Repository
Other
8.2k stars 2.17k forks source link

Detect PowerShell w/o PowerShell Execution via RunDLL32 and various other methods #4197

Open JulianDroste opened 1 year ago

JulianDroste commented 1 year ago

Description of the Idea of the Rule

I want to propose a rule enabling the detection of PowerShell without using the well-known powershell.exe but rather via rundll32.exe and various other methods. Projects like PowerShx and its predecessor PowerShdll enable this method of PowerShell Execution. Happy to gather feedback from you!

Public References / Example Event Log

nasbench commented 1 year ago

Hi,

We have 2 rules covering a similar behaviour.

Hope this helps.

JulianDroste commented 1 year ago

Hi @nasbench thanks for the swift feedback - I apparently overlooked those two rules. To my understanding the two rules should cover what I want to detect. Not too sure if the additional resources provided add anything to "enhance" the existing rules, but apart from that I think this issue can be closed :)

nasbench commented 1 year ago

Still haven't delve deep into them, I appreciate you providing them and will definitely look into it to see if I can improve them in any form. I'll leave this open for now just so I can get back to you once I finish checking everything in them.

Thanks once again, really appreciate it the feedback